Testing and Improving the Correctness of Wi-Fi Frame Injection

被引:0
作者
Vanhoef, Mathy [1 ]
Jiao, Xianjun [2 ]
Liu, Wei [2 ]
Moerman, Ingrid [2 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Leuven, Belgium
[2] Univ Ghent, IDLab, Imec, Ghent, Belgium
来源
PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023 | 2023年
关键词
802.11; monitor mode; packet injection; radiotap;
D O I
10.1145/3558482.3581779
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Investigating the security of Wi-Fi devices often requires writing scripts that send unexpected or malformed frames, to subsequently monitor how the devices respond. Such tests generally use Linux and off-the-self Wi-Fi dongles. Typically, the dongle is put into monitor mode to get access to the raw content of received Wi-Fi frames and to inject, i.e., transmit, customized frames. In this paper, we demonstrate that monitor mode on Linux may, unbeknownst to the user, mistakenly inject Wi-Fi frames or even drop selected frames instead of sending them. We discuss cases where this causes security testing tools to misbehave, making users to believe that a device under test is secure while in reality it is vulnerable to an attack. To remedy this problem, we create a script to test raw frame injection, and we extend the Radiotap standard to gain more control over frame injection. Our extension is now part of the Radiotap standard and has been implemented in Linux. We tested it using commercial Wi-Fi dongles and using openwifi, which is an open implementation of Wi-Fi on top of software-defined radios. With our improved setup, we reproduced tests for the KRACK and FragAttack vulnerabilities, and discovered previously unknown vulnerabilities in three smartphones.
引用
收藏
页码:287 / 292
页数:6
相关论文
empty
未找到相关数据